One of the findings of risk assessment is that many of the servers on the data center subnet contain data that is in scope for PCI compliance, Everyone in the company has access to these servers, regardless of their job function. Which of the following should the administrator do?
A. Segment the network
B. Use 802.1X
C. Deploy a proxy sever
D. Configure ACLs
E. Write an acceptable use policy
Answer: A. Segment the network
You might also like to view...
In addition to ensuring adequate awareness of future risk, the risk management process also makes certain that a commonly accepted and systematic set of policies and procedures is in place to handle existing risks.
Answer the following statement true (T) or false (F)
The contents of ________ memory are erased when the computer is turned off
Fill in the blank(s) with correct word
In a business letter, the ____________________, which consists of the month, day, and year, is positioned two to six lines below the letterhead.
Fill in the blank(s) with the appropriate word(s).
Typically data in a database is organized into fields, records, and files.
Answer the following statement true (T) or false (F)